radare
@radareorg@infosec.exchange
The official radare2 account in the Fediverse
0
Followers
0
Following
Joined November 09, 2022
Website:
Discord:
Conference (Oct 24,25):
Posts
Open post
Iaito 6.1.4 is out! 💥
Tons of stability improvements, new widgets, userfriendly features, brings back the debugger mode, display analysis progress and background webserver ideal for r2mcp.
Full changelog https://github.com/radareorg/iaito/releases/tag/6.1.4 #reverseengineering
#radare2
Tons of stability improvements, new widgets, userfriendly features, brings back the debugger mode, display analysis progress and background webserver ideal for r2mcp.
Full changelog https://github.com/radareorg/iaito/releases/tag/6.1.4 #reverseengineering
#radare2
8
0
7
0
Open post
r2, r2frida, r2ghidra 6.1.4 are out! I will work tomorrow on the release notes! Stay tuned because this is probably the release that ships more security fixes in the whole history of the project! So please update asap!
6
0
2
0
Open post
“Exploring Android Protections on RASP Times" - using radare2 and frida to beat rasp — https://medium.com/@justmobilesec/exploring-android-protections-on-rasp-times-3d140e8df115
3
0
2
0
Open post
Announcing the first version of the radare2 GithubAction!
https://github.com/radareorg/github-actions/releases/tag/v1
https://github.com/radareorg/github-actions/releases/tag/v1
3
0
1
0
Open post
Here’s why it’s important to always use r2 from git. In r2land, we follow the law of full disclosure and fix any reported vulnerability within a 24h deadline, as stated in SECURITY.md #radare2 https://blog.calif.io/p/mad-bugs-discovering-a-0-day-in-zero
7
0
6
0
Open post
Codex plugins are packages for skills, mcps and prompts, adding descriptions, icon and tie them to distributed marketplaces to handle updates. r2mcp is now distributed as one.
Just run “make codex-plugin-install” and enjoy it in vscode, codex app and codex cli!
Just run “make codex-plugin-install” and enjoy it in vscode, codex app and codex cli!
0
0
0
0
Open post
“Reverse Engineering the ITE 8910 Keyboard RGB Protocol for OpenRGB” with #radare2 https://chocapikk.com/posts/2026/reverse-engineering-ite8910-keyboard-rgb/
1
0
5
0
Open post
@asher_davila just open sourced its #radare2 Python script for parsing .gopclntab and recovering function symbols from Go binaries, including fully stripped ones. Supports ELF, Mach-O, and PE across Go versions 1.2, 1.16, 1.18, and 1.20+ https://github.com/AsherDLL/r2gopclntabParser #golang #reverseengineering
5
0
3
0
Open post
💥New release of BannedFuncDetector by @seifreed
〰️〰️〰️〰️〰️〰️〰️〰️〰️
BannedFuncDetector is a Python tool that scans binary files to detect banned or insecure functions. It supports traditional radare2 decompilers and AI-assisted decompilation to provide readable output and highlight risky calls.
https://github.com/seifreed/BannedFuncDetector
〰️〰️〰️〰️〰️〰️〰️〰️〰️
BannedFuncDetector is a Python tool that scans binary files to detect banned or insecure functions. It supports traditional radare2 decompilers and AI-assisted decompilation to provide readable output and highlight risky calls.
https://github.com/seifreed/BannedFuncDetector
2
0
2
0
Open post
7
0
7
0
Open post
r2frida 6.1.0 https://github.com/nowsecure/r2frida/releases/tag/6.1.0 #reverseengineering #frida #mobsec #ios #android
4
0
3
0
Open post
iaito 6.1.0 is out! https://github.com/radareorg/iaito/releases/tag/6.1.0 #radare2 #reverseengineering
4
0
3
0
Open post
You can now choose where to locate the navigation bar and the colors match the selected color theme. Next release will hopefully be next week! Keep up testing and reporting anything you find :)
5
0
5
0
Open post
"Exploring Android Protections on RASP Times" with Frida and Radare2 -- https://www.linkedin.com/pulse/exploring-android-protections-rasp-times-just-mobile-security-lc5gf/
2
0
3
0
Open post
This ChatGPT-like service for binary analysis is now running #radare2 on every prompt!
Combines the reports generated from batch runs of IDA, Ghidra and BinaryNinja for better contextual analysis.
Even if the primary focus is malware analysis, lots of use cases can be covered too.
https://omniasec.ai/
Combines the reports generated from batch runs of IDA, Ghidra and BinaryNinja for better contextual analysis.
Even if the primary focus is malware analysis, lots of use cases can be covered too.
https://omniasec.ai/
4
0
4
0
Open post
🌍Making #radare2 more portable and accessible to new audiences has been always a priority for us.
At #r2con2025, @AbhiTheModder created a web frontend for #radare2 using the webassembly builds to allow Chromebook students reverse engineer crackmes from the browser!
• Select version of r2
• Create multiple tabs
• Keyboard driven
• Analyze large binaries
This sandboxed environment is ideal for education as well as for malware analysis and the whole toolchain can be used from the commandline with wasmer.
• Try it online https://r2.revengi.in
• HTML radare2 Widget https://radareorg.github.io/r2wasm/index.html
• Source code https://github.com/radareorg/r2web
• Watch the presentation 👇
https://youtu.be/TblF4f91NnA
At #r2con2025, @AbhiTheModder created a web frontend for #radare2 using the webassembly builds to allow Chromebook students reverse engineer crackmes from the browser!
• Select version of r2
• Create multiple tabs
• Keyboard driven
• Analyze large binaries
This sandboxed environment is ideal for education as well as for malware analysis and the whole toolchain can be used from the commandline with wasmer.
• Try it online https://r2.revengi.in
• HTML radare2 Widget https://radareorg.github.io/r2wasm/index.html
• Source code https://github.com/radareorg/r2web
• Watch the presentation 👇
https://youtu.be/TblF4f91NnA
11
0
8
0
Open post
6
2
9
0